Software Development Security

Results: 957



#Item
711Java platform / Java programming language / Oracle Corporation / Sun Microsystems / Oracle Database / Java Development Kit / Java / Computing / Software / Cross-platform software

1 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. One Year of Security Enhancements in the JRE

Add to Reading List

Source URL: oracleus.activeevents.com

Language: English
712Security / Software development / Science / Software engineering / Software development process / Information security / Systems engineering process / Reliability engineering / Federal Information Security Management Act / Data security / Systems engineering / Computer security

Q:OTOPiciesended INTERIM procedures.wpd

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2009-12-18 16:06:40
713Enterprise architecture / Computing / CompTIA / Information security / Information systems / Information technology management / Software development process

Information Technology Director – 1080 Page 1 City and Borough Sitka, Alaska

Add to Reading List

Source URL: cityofsitka.com

Language: English - Date: 2014-06-27 14:24:41
714Business / Actuarial science / Management / Risk management / Internal control / Internal audit / Software development process / Operational risk / Auditing / Risk / Security

Fehler! Unbekannter Name für Dokument-Eigenschaft. Fehler! Unbekannter Name für Dokument-Eigenschaft. Fehler! Unbekannter Name für Dokument-Eigenschaft. Unbekannter Name für Dokument-Eigenschaft. Fehler! Unbekannter

Add to Reading List

Source URL: www.naic.org

Language: English - Date: 2011-08-16 16:17:29
715Government Accountability Office / Open government / Technology assessment / Census / United States Census Bureau / Risk management / Software development process / Statistics / Science / Security

United States Government Accountability Office GAO Testimony

Add to Reading List

Source URL: www.gao.gov

Language: English - Date: 2011-09-29 19:50:34
716Security / Cyberwarfare / Data security / Penetration test / Computer forensics / EC-Council / Information security / Vulnerability / Department of Defense Cyber Crime Center / Computer security / Information technology audit / Software testing

Duane G. Hopkins SUMMARY OF STRENGTHS EDiscovery, Computer Forensics, Ethical Hacking methodology implementation to business environment Strong Communication skills in training, development and presentations on Informat

Add to Reading List

Source URL: www.emich.edu

Language: English - Date: 2011-12-07 20:35:34
717Business / Ethics / Risk / Security / Risk management / Emergency management / Systems engineering process / Program management / Software development process / Management / Project management / Actuarial science

Canadian Municipal Water Consortium INVITATION TO SUBMIT FULL PROPOSALS Knowledge Integration Project “Integrated Risk Management Framework for Municipal Water” (Deadline for Proposal Submission March 12, 2014)

Add to Reading List

Source URL: www.cwn-rce.ca

Language: English - Date: 2014-01-13 15:37:07
718Manufacturing / Acceptance testing / System testing / Test plan / Software performance testing / Integration testing / Graduate Record Examinations / Requirement / Test strategy / Software testing / Software development / Evaluation

Test Analysis Report Test Analysis Report Overview The Test Analysis Report documents software testing unit/module, subsystem integration, system, user acceptance, and security - as defined in the test plan. The Test A

Add to Reading List

Source URL: doit.maryland.gov

Language: English - Date: 2014-09-04 11:15:19
719Structure / Object-oriented programming / Software design / Pattern language / Attack patterns / Data mining / Security Patterns / Design Patterns / Frame language / Software engineering / Software design patterns / Design

Future Directions for Research on Cyberpatterns Clive Blackwell and Hong Zhu Abstract As patterns in cyberspace, cyberpatterns shed light on research on the development of cyber systems from a new angle. They can help us

Add to Reading List

Source URL: cms.brookes.ac.uk

Language: English - Date: 2014-01-26 12:38:10
720Software design patterns / Design / Software development / Object-oriented programming / Pattern matching / Attack patterns / Pattern / Design Patterns / Software design / Software engineering / Computing / Computer programming

Cyberpatterns 2012 Proceedings of the First International Workshop on Cyberpatterns: Unifying Design Patterns with Security, Attack and Forensic Patterns 9-10 July 2012

Add to Reading List

Source URL: compeng.ulster.ac.uk

Language: English - Date: 2013-08-13 11:32:10
UPDATE